Comodo Help
Find the desired product help
Endpoint Manager

Endpoint Manager

Comodo Client Security 12.15

English

Print Help Download Help
CCS Advanced Settings > General Settings > Log Settings
  • Introduction To Comodo Client Security
    • Special Features
    • System Requirements
    • Install Comodo Client Security
    • Start Comodo Client Security
    • The Main Interface
      • The Home Screen
      • The Tasks Interface
      • The Widget
      • The System Tray Icon
    • Understand Security Alerts
    • Password Protection
  • General Tasks - Introduction
    • Scan And Clean Your Computer
      • Run A Quick Scan
      • Run A Full Computer Scan
      • Run A Rating Scan
      • Run A Custom Scan
        • Scan A Folder
        • Scan A File
        • Create, Schedule And Run A Custom Scan
      • Automatically Scan Unrecognized And Quarantined Files
    • Instantly Scan Files And Folders
    • Process Infected Files
    • Manage Virus Database Updates
    • Manage Blocked Autoruns
    • Manage Quarantined Items
  • Firewall Tasks - Introduction
    • Configure Internet Access Rights For Applications
    • Stealth Your Computer Ports
    • Manage Network Connections
    • Stop All Network Activities
    • View Active Internet Connections
  • Containment Tasks - Introduction
    • Run An Application In The Container
    • Reset The Container
    • Identify And Kill Unsafe Running Processes
    • Open Shared Space
    • The Virtual Desktop
      • Start The Virtual Desktop
      • The Main Interface
      • Run Browsers Inside The Virtual Desktop
      • Open Files And Run Applications Inside The Virtual Desktop
      • Pause And Resume The Virtual Desktop
      • Close The Virtual Desktop
    • Containment Statistics Analyzer
  • DLP Tasks - Introduction
    • Run Data Loss Prevention Scans
    • Manage DLP Quarantined Files
  • Advanced Tasks - Introduction
    • Create A Rescue Disk
      • Download And Burn Comodo Rescue Disk
    • Remove Deeply Hidden Malware
    • Manage CCS Tasks
    • View CCS Logs
      • Antivirus Logs
      • VirusScope Logs
      • Firewall Logs
      • HIPS Logs
      • Containment Logs
      • Website Filtering Logs
      • Device Control Logs
      • Autorun Event Logs
      • Alert Logs
      • CCS Tasks Logs
      • File List Changes Logs
      • Vendor List Changes Logs
      • Configuration Changes Logs
      • Virtual Desktop Event Logs
      • Data Loss Prevention Event Logs
      • Search And Filter Logs
    • Submit Files For Analysis To Comodo
    • View Active Process List
  • CCS Advanced Settings
    • General Settings
      • Customize User Interface
      • Configure Virus Database Updates
      • Log Settings
      • Manage CCS Configurations
        • Comodo Preset Configurations
        • Personal Configurations
      • Manage Performance
    • Antivirus Configurations
      • Real-time Scanner Settings
      • Scan Profiles
    • Firewall Configuration
      • General Firewall Settings
      • Application Rules
      • Global Rules
      • Firewall Rule Sets
      • Network Zones
        • Network Zones
        • Blocked Zones
      • Port Sets
    • HIPS Configuration
      • HIPS Settings
      • Active HIPS Rules
      • HIPS Rule Sets
      • HIPS Groups
        • Registry Groups
        • COM Groups
    • Protected Objects
      • Protected Objects - HIPS
        • Protected Files
        • Blocked Files
        • Protected Registry Keys
        • Protected COM Interfaces
      • Protected Objects - Containment
        • Protected Files And Folders
        • Protected Keys
    • Data Loss Prevention
      • DLP Monitoring Rules
      • DLP Discovery Rules
      • DLP Keyword Groups
    • Containment Settings
      • Containment Settings
      • Auto-Containment Rules
      • Virtual Desktop Settings
      • Containment - An Overview
      • Unknown Files - The Scanning Processes
    • File Rating Configuration
      • File Rating Settings
      • File Groups
      • Submitted Files
    • Advanced Protection
      • VirusScope Settings
      • Scan Exclusions
      • Device Control Settings
      • Script Analysis Settings
      • Miscellaneous Settings
    • Web Filter Settings
      • Website Filtering Rules
      • Website Categories
  • Appendix 1 - CCS How To... Tutorials
    • Enable / Disable AV, Firewall, Auto-Containment And VirusScope Easily
    • Set Up The Firewall For Maximum Security And Usability
    • Block Internet Access While Allowing Local Area Network (LAN) Access
    • Set Up HIPS For Maximum Security And Usability
    • Create Rules To Auto-Contain Applications
    • Run An Instant Antivirus Scan On Selected Items
    • Create An Antivirus Scan Schedule
    • Run Untrusted Programs Inside The Container
    • Run Browsers Inside The Container
    • Restore Incorrectly Quarantined Items
    • Submit Quarantined Items To Comodo Valkyrie For Analysis
    • Enable File Sharing Applications Like BitTorrent And Emule
    • Block Any Downloads Of A Specific File Type
    • Disable Auto-Containment On A Per-application Basis
    • Switch Off Automatic Antivirus Updates
    • Suppress CCS Alerts Temporarily
    • Control External Device Accessibility
  • Appendix 2 - Comodo Secure DNS Service
    • Router - Manually Enable Or Disable Comodo Secure DNS
    • Windows - Enable Comodo Secure DNS
  • About Comodo Security Solutions

Log Settings


  • Click 'Settings' > 'General Settings' > 'Logging'.
  • Comodo Client Security keeps detailed records of all antivirus, firewall, HIPS, containment, device control, VirusScope and autorun events.
  • Logs are also created for 'Alerts Displayed', 'Tasks Launched', 'File List' changes, 'Vendor list changes' and 'CCS Configuration Changes'.
    • Log settings let you specify the storage location, the maximum size of log files, and how CCS should react if the maximum file size is exceeded.

      Note: You can view logs themselves at 'Tasks' > 'Advanced Tasks' > 'View Logs'.


      Configure Log settings

      • Click 'Settings' on the CCS home screen
      • Click 'General Settings' > 'Logging':


       

      Logging

      • Write to local log database (COMODO format) - Enable or disable logs in Comodo format.(Default = Enabled)
      • Write to Syslog Server (CEF Format) - CCS forwards the logs to an external Syslog server integrated with Endpoint Manager (EM). Enter the IP/hostname and port of the Syslog server in fields provided. (Default = Disabled)
      • Write to remote server (JSON format) - CCS forwards the logs over https to a server integrated with Endpoint Manager. (Default = Disabled)
      • Host - Enter the IP address or the host name of the server
      • Port - The port through which the server listens to the CCS logs
        • Token - Enter the client authentication token so CCS can connect and forward logs to the server. The token is generated when you configure the HTTP Event Collector (HEC) on the server.

        • See https://docs.splunk.com/Documentation/Splunk/7.2.6/Data/UsetheHTTPEventCollector if you need help to setup the event collector and generate a token.
              • Enter the IP/hostname and port of the server in fields provided. Enter the security token to access the remote server in the field provided.
                • Write to Log file (CEF) Format - CCS stores the logs at a specific local or network location. Click 'Browse' to select the storage location. (Default = Disabled)
                • Write to Windows Event Logs - CCS logs are appended to 'Windows Event' logs. (Default = Enabled)
                • Type 'Event Viewer' in Windows search to view Windows logs

                Log File Management

                • Specify what should happen when the log file reaches a certain size. You can choose keep the older logs or discard them.
                • When log file reaches - Enter the maximum size of a log file in MB. (Default = 100MB)
                • Keep on updating it removing the oldest records– When a log file reaches the max. size, CCS will delete the earliest log entries to make room for the new entries. (Default = Enabled)
                • Move it to the specified folder – When a log file reaches the max. size, CCS starts a new log file and moves the old one to a folder of your choice. (Default = Disabled)
                • Select the option and click 'the specified folder' to choose the storage folder:


                 

                The selected folder path will appear beside 'Move it to'.



                User Statistics

                • Send anonymous program usage statistics to Comodo - Comodo collects usage details so we can analyze how our users interact with CCS. This real-world data allows us to create product improvements which reflect the needs of our users. If you enable this option, CCS will periodically send usage data to Comodo servers through a secure, encrypted channel. Your privacy is not affected because the data is anonymized. Disable this option if you don't want to send usage details to Comodo. (Default = Enabled)
                  • Click 'OK' for your changes to take effect.
                  Our Products
                  • Free Antivirus
                  • Free Internet Security
                  • Website Malware Removal
                  • Free Anti-Malware
                  • Anti-Spam (Free Trial)
                  • Windows Antivirus
                  • Antivirus for Windows 7
                  • Antivirus for Windows 8
                  • Antivirus for Windows 10
                  • Antivirus for MAC
                  • Antivirus for Linux
                  • Free Endpoint Security
                  • Free ModSecurity
                  • Free RMM
                  • Free Website Malware Scanner
                  • Free Device Manager for Android
                  • Free Demo
                  • Network Security
                  • Endpoint Protection
                  • Antivirus for Android
                  • Comodo Antivirus
                  • Wordpress Security
                  Cheap CDN
                  • Bootstrap CDN
                  • Semantic UI CDN
                  • Jquery CDN
                  • CDN Plans
                  • CDN
                  • Free CDN
                  Enterprise
                  • Patch Management Software
                  • Patch Manager
                  • Service Desk
                  • Website Down
                  • Endpoint Protection Solutions
                  • Website Security Check
                  • Remote Monitoring and Management
                  • Website Security
                  • Device Manager
                  • ITSM
                  • CRM
                  • MSP
                  • Android Device Manager
                  • MDR Services
                  • Managed IT Support Services
                  • Free EDR
                  Free SSL Certificate
                  Support Partners Terms and Conditions Privacy Policy

                  © Comodo Group, Inc. 2025. All rights reserved.